ExpGen: A 2-Step Vulnerability Exploitability Evaluation Solution for Binary Programs under ASLR Environment

Current automatic exploit generation solutions generally adopt an 1-step exploit generation philosophy and neglect the potential difference between analysis-time environment and runtime environment. Therefore, they usually fail in evaluating exploitability for vulnerable programs running in an ASLR...

Full description

Bibliographic Details
Main Authors: Huang, H. (Author), Lu, Y. (Author), Pan, Z. (Author), Yu, L. (Author), Zhang, L. (Author), Zhu, K. (Author)
Format: Article
Language:English
Published: MDPI 2022
Subjects:
Online Access:View Fulltext in Publisher
LEADER 02272nam a2200241Ia 4500
001 10.3390-app12136593
008 220718s2022 CNT 000 0 und d
020 |a 20763417 (ISSN) 
245 1 0 |a ExpGen: A 2-Step Vulnerability Exploitability Evaluation Solution for Binary Programs under ASLR Environment 
260 0 |b MDPI  |c 2022 
856 |z View Fulltext in Publisher  |u https://doi.org/10.3390/app12136593 
520 3 |a Current automatic exploit generation solutions generally adopt an 1-step exploit generation philosophy and neglect the potential difference between analysis-time environment and runtime environment. Therefore, they usually fail in evaluating exploitability for vulnerable programs running in an ASLR environment. We propose ExpGen, a 2-step vulnerability-exploitability evaluation solution for binary programs running in an ASLR environment, with three novel techniques introduced, separately partial-exploit sensitive-POC generation, exploitation context sensitive analysis-time exploit generation, and runtime exploit relocation. ExpGen firstly generates an analysis-time exploit that can carry out all the desired exploitation steps through applying the first two techniques in an iterative manner, then dynamically gaps the address-space layout differences between the analysistime environment and runtime environment by adopting the runtime exploit-relocation technique, making the analysis-time exploit dynamically adaptable to the runtime exploitation session. Using a benchmark containing six test programs, 10 CTF&RHG programs and four real-world applications with known vulnerabilities, we demonstrate that ExpGen can effectively generate partial exploit input that carries out some address-leakage event and provide a complete automated exploitability evaluation workflow on vulnerable programs running in the ASLR environment. © 2022 by the authors. Licensee MDPI, Basel, Switzerland. 
650 0 4 |a address leakage 
650 0 4 |a exploit generation 
650 0 4 |a partial exploit 
650 0 4 |a runtime exploit relocation 
700 1 |a Huang, H.  |e author 
700 1 |a Lu, Y.  |e author 
700 1 |a Pan, Z.  |e author 
700 1 |a Yu, L.  |e author 
700 1 |a Zhang, L.  |e author 
700 1 |a Zhu, K.  |e author 
773 |t Applied Sciences (Switzerland)